Vapt
Vapt
Description: Wireshark will help you capture network packets and display them at a
granular level. Once these packets are broken down, you can use them for real-time or offline
analysis. This tool lets you put your network traffic under a microscope, and then filter and drill
down into it, zooming in on the root cause of problems, assisting with network analysis and
ultimately network security. Wireshark will enable to capture, interpret, filter and inspect data
packets to effectively troubleshoot
Monitoring network traffic is a crucial aspect of maintaining network security and identifying potential
threats and anomalies.
Below are step-by-step instructions on how to monitor network traffic using a network monitoring tool
like Wireshark.
Procedure:
1. Install Wireshark:
- Download and install Wireshark, a widely used network traffic analysis tool, from its official
website.
- Follow the installation wizard and select the necessary components for your operating
system.
Output:
Experiment 2: Host & Services Discovery using Nmap
Description: Nmap is an open-source utility for network discovery. Network Mapper is a security auditing
and network scanning independent tool developed by Gordon Lyon. It is used by network administrators to
detect the devices currently running on the system and the port number by which the devices are
connected.Many systems and network administrators are used for managing network inventory, service upgrade
schedules, monitoring hosts and service uptime.At the top-level, Nmap is defined as a tool that can detect or
diagnose services that are running on an Internet-connected system by a network administrator in their
networked system used to identify potential security flaws. It is used to automate redundant tasks, such as
monitoring the service.
2.nmap 172.67.203.111
4.nmap –p 80 172.67.203.111
Procedure:
1. Access OpenVAS Web Interface(https://app.greenbone.cloud/):
- Open a web browser and access the OpenVAS web interface using the specified URL .
2. Login to OpenVAS:
- Login to the web interface using the default credentials or create a cloud account by using your official
college account like I created free account with shravan@svit.ac.in.
3. Create a Target:
- Define a target for vulnerability scanning by specifying the IP range or individual host to be scanned like
you cangive ip address of the target.May be ip address of our college by finding through traceroute or ping
command.
- Once the scan completes as per the scheduled time, review the scan results, which will highlight
vulnerabilities.
- Prioritize vulnerabilities based on severity and potential impact, and plan the remediation process
accordingly.
7. ViewReports:
Description: Nmap is an open-source utility for network discovery. Network Mapper is a security auditing
and network scanning independent tool developed by Gordon Lyon. Network scanning is the method used to
scan a network, primarily for security assessment and maintaining the system. Hackers use it for carrying out
attacks. Ethical hackers and technical teams use network scanning to check whether the devices in work are
working as expected and whether there are no vulnerabilities and loopholes. By finding the issues, they can then
troubleshoot them. Mapping the Application.we have to know more about the application you are targeting. The
mantra to find bugs is Enumeration…. The more you know how an application works the easier things get that is
called mapping.
Procedure:
1.sudo nmap -Sa 172.67.203.111
2.nmap –p 80 172.67.203.111
Procedure:
1. Download waap analyizer for knowing the techstack of any company.It is a chrome extension.
2. Click on website (www.cybersapiens.com.au) and then click on waap analyzer to know what all technology
is used,identify if wordpressis used and the version.:
3. go to wp-admin subdomain of that website and you can see admin username and password is open.so a
information leakage cve is there in wordpress version used
Output:
Experiment 4(d): ARP POISIONING
Description:
ARP is the acronym for Address Resolution Protocol. It is used to convert IP address to physical addresses
[MAC address] on a switch. The host sends an ARP broadcast on the network, and the recipient computer
responds with its physical address [MAC Address]. The resolved IP/MAC address is then used to
communicate. ARP poisoning is sending fake MAC addresses to the switch so that it can associate the fake
MAC addresses with the IP address of a genuine computer on a network and hijack the traffic
Procedure:
arp –a.
2. Enter the following command For inputting your ip address and physical macadress of your machine,
arp –a
arp –d 192.168.1.38
Now the ARP poisoning works by sending fake MAC addresses to the switch .
Experiment 4(e): DNS Poisioning
Description: Domain Name System (DNS) poisoning happens when fake information is entered into
the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the
wrong website. DNS poisoning also goes by the terms “DNS spoofing” and “DNS cache poisoning.”DNS
servers take the words you type in when looking up a website, such as “svit.ac.in.com,” and use them to find the
Internet Protocol (IP) address associated with it. These addresses are stored in the DNS cache. If the wrong IP
address is put in the cache, the user gets directed somewhere other than where they want to go.
Procedure:
DNS Poisoning –
- Set up an attacker machine on the local network, or if attempting remote DNS poisoning, ensure network
connectivity to the target DNS server.
- Identify the IP address of the target DNS server that the victim relies on for domain name resolution.
- Learn about the caching mechanism of the target DNS server, including the TTL (Time to Live) values for
DNS records.
- Choose a domain that you want to spoof and for which you want to redirect the DNS responses.
- On the attacker machine, set up a web server or an IP address that will serve as the fake destination for the
spoofed domain.
- Use DNS spoofing tools like `dnsspoof` or `Ettercap` to generate forged DNS responses with the spoofed
domain and corresponding IP address.
- Execute the DNS poisoning attack by sending the forged DNS responses to the target DNS server.
- The DNS server's cache will be updated with the malicious DNS records.
- The victim's DNS cache will be poisoned with the malicious DNS records.
- When the victim tries to access the spoofed domain, they will be redirected to the attacker-controlled
destination.
- After the attack, restore the DNS server's cache and take measures to prevent future DNS poisoning attacks,
such as implementing DNSSEC (DNS Security Extensions) and using DNS filtering and monitoring solutions.
Experiment 5(a): . Evaluating external Infrastructure using Nmap
Description: External penetration testing (also known as external network penetration testing) is a security
assessment of an organization's perimeter systems. Your perimeter comprises all those systems which are
directly reachable from the internet. By nature, they are the most exposed systems as they are out in the open
and are therefore the most easily and regularly attacked.
The aim of an external pentest is to find ways to compromise your accessible (external) systems and services,
gain access to sensitive information, and discover methods an attacker could use to attack your clients or users.
Here in this exercise,we are assuming (www.svit.ac.in) as external site ,as the server is located elsewhere and
for privacy AND security reasons ,it is safe to use this site.
Procedure:
1.Basic scan to scan ip address or host:
nmap svit.ac.in
192.168.1.106
www.svit.ac.in
The “-iL” parameter lets you read from that file, and scan all those hosts for you:
4. Scan + OS and service detection with fast execution and tcp,udp scan
Using the “-A” parameter enables you to perform OS and service detection, and at the same time we are
combining this with “-T4” for faster execution. See the example below:
Using “–top-ports” parameter along with a specific number lets you scan the top X most common ports for that
host, as we can see:
Network topology is structure of a network and may be depicted physically or logically. It is an application
of graph theory wherein communicating devices are modeled as nodes and the connections between the devices
are modeled as links or lines between the nodes. Physical topology is the placement of the various components
of a network (e.g., device location and cable installation), while logical topology illustrates how data flows
within a network. Distances between nodes, physical interconnections, transmission rates, or signal types may
differ between two different networks, yet their logical topologies may be identical.
Procedure:
1.Download and install nmap.(plz make sure you checkall the options while installing)
5. save it by clicking the graphic tab and name the file as per your preference.
.
Output:
Experiment 5(c): Lookup domain registry for IP information
Description: A domain name registry is a database of all domain names and the associated registrant
information in the top level domains of the Domain Name System (DNS) of the Internet that enables third party
entities to request administrative control of a domain name. Most registries operate on the top-level and second-
level of the DNS. A domain name is not the type of thing that you can buy off the shelf. The process here
follows a systematic protocol, which is coordinated by a top-level nonprofit authority called ICANN (Internet
Corporation for Assigned Names).Simply put, ICANN oversees domain registration. Domain names only
become valid after they’re entered into its central registry (domain registry).The role of the domain registry is
to manage and maintain domain names. This leaves the task of selling domain names to domain
registrars.Now, to become a domain name registrar, you need accreditation from ICANN. And with that, you
get to sell domain names to the public either directly or through re-sellers.
Procedure:
2.Type whois.domaintools.com.
4.Hit Submit details and note down the details corresponding to the fields.
Output:
Experiment 5(D): Examining use of IPV6 at remote location
Description: An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an
Internet Protocol Version 6 (IPv6) network. IPv6 is the successor to a previous addressing infrastructure, IPv4,
which had limitations IPv6 was designed to overcome. Notably, IPv6 has drastically increased address
space compared to IPv4.
In precise terms, an IPv6 address is 128 bits long and is arranged in eight groups, each of which is 16 bits. Each
group is expressed as four hexadecimal digits and the groups are separated by colons.
FE80:CD00:0000:0CDE:1257:0000:211E:729C
Procedure:
1.Open the command prompt by typing cmd in search bar of your computer.
2.Type nslookup followed bythe target website for which you want to know the details,
3.Note down the details that are displayed ,youcansee the 128 bit address which is ipv6 format and also the
normal ipadress that is 32 bit.
Output:
Experiment 6: Types of vulnerability scanning
1. Broken access control occurs when an issue with the access control enforcement allows a user to perform an
action outside of the user's limits. For example, an attacker may be able to exploit a flaw in an application with
the intention of gaining elevated access to data to which they are not entitled and can perform unauthorized
actions.
2. A cryptographic failure flaw can occur when you store or transmit data in clear text or try to protect data with
old or weak encryption. For example, consider a site that doesn't enforce TLS for all pages. An attacker steals
the user's session cookie and then replays this cookie and hijacks the user's (authenticated) session, accessing or
modifying the user's private data.
3. Injection attacks are a type of security vulnerability that arises when an application takes user input and uses
that input in an unsafe way. Injection attacks are one of the most dangerous attacks where an attacker simply
sends malicious data to make the application process it and do something it is not supposed to do.
4. Insecure design expressed as “missing or ineffective control design. ” If a system or product design is not
secure, it can be considered an insecure design. For instance, a malicious actor could reserve 600 movie tickets
for a specific timeframe, preventing genuine buyers from reserving any. This situation could have been
prevented if the system design had limited reservations to just 15 tickets.
5. Misconfiguration vulnerabilities are configuration weaknesses that may exist in software components or may
have unneeded services enabled, such as remote administration functionality. For example, web server software
may ship with default user accounts that an attacker can use to access the system, or the software may contain
sample files, such as configuration files and scripts that an attacker can exploit.
6. The term “vulnerable” or “outdated” components is used to describe software susceptible to being breached,
hacked, or otherwise compromised. An attacker may exploit component vulnerabilities and then gain access to
unauthorized information, modify data, or cause a denial of service (DoS). Components can include OS,
Database, API and Server etc.
7. Identification and authentication failures can occur when functions related to a user's identity, authentication,
or session management are not implemented correctly. Attackers may be able to exploit identification and
authentication failures by compromising passwords, keys, session tokens, or exploit other implementation flaws
to assume other users' identities
8. Software and data integrity failures relate to code and infrastructure that does not protect against integrity
violations or use software from untrusted sources. An insecure CI/CD pipeline can introduce the potential for
unauthorized access, malicious code, or system compromise
9. Failure to sufficiently log, monitor, or report security events, makes suspicious behavior difficult to detect
and greatly increases the chances of an attacker successfully taking advantage of your application. A children's
health plan provider's website operator couldn't detect a breach due to a lack of monitoring and logging. The
attacker had accessed and modified thousands of sensitive health records
10. Server Side Request Forgery (SSRF) attacks are used to target internal systems that are behind firewalls and
are not accessible from the external network. In a normal SSRF attack the attacker might cause the server to
make a connection to internal services by exploiting internally running services like SSH, localhost, FTP etc
and steals the data.